Sciweavers

2747 search results - page 342 / 550
» Network externalities in software systems
Sort
View
IJCIM
2007
82views more  IJCIM 2007»
13 years 10 months ago
Towards a classification framework for interoperability of enterprise applications
: Software applications interoperability is a challenge for modern enterprises. It needs establishing standards and protocols for data exchange between different enterprise systems...
Hervé Panetto
AC
2004
Springer
13 years 10 months ago
Cognitive Hacking
In this chapter, we define and propose countermeasures for a category of computer security exploits which we call "cognitive hacking." Cognitive hacking refers to a comp...
George Cybenko, Annarita Giani, Paul Thompson
IEEECIT
2010
IEEE
13 years 8 months ago
Component-based Mobile Web Application of Cross-platform
This article describes the status and analyses the challenges of mobile application development, proposed a frame of component-based hierarchical development. Software is divided ...
Biao Pan, Kun Xiao, Lei Luo
ICFEM
2010
Springer
13 years 8 months ago
Reasoning about Safety and Progress Using Contracts
Designing concurrent or distributed systems with complex architectures while preserving a set of high-level requirements through all design steps is not a trivial task. Building up...
Imene Ben Hafaiedh, Susanne Graf, Sophie Quinton
ECOOP
1998
Springer
14 years 2 months ago
Mobile Objects and Mobile Agents: The Future of Distributed Computing?
This paper will lead you into the world of mobile agents, an emerging technology that makes it very much easier to design, implement, and maintain distributed systems. You will fin...
Danny B. Lange